Author: admin

PDF files are associated with Adobe Acrobat. You can use Adobe Acrobat Reader to view these files. Software such as Acrobat DC Pro and Acrobat XI allows you to create or even edit these files. PDF files are usually easy to read but hard to re-edit. This is where converting to Microsoft Office Word document […]

(Featured Image: Something that resemble lightning speed. Taken by Anders Jildén, xoz, your site above to be super fast) Intended Users: If your situation is similar to what describes bellow, then this article is for you. You have a domain name, on Route 53 or with other service provider (i.e. NameCheap.com) and your DNS provider […]

(Featured image is a screenshot of java class PS2PDF’s uses to execute external executables) Linux users are mapped to SELinux users via a policy. This allow inheriting rules that would restrict things they can do in a system. Following command will give you all the mapping and users on a CentOS/RHEL system # semanage login […]

(Featured image is a PostScript file written to exploit servers running GhostScript. It was used to get an shell on our servers to mine bitcoin) Default SELinux policy enabled in CentOS/RHEL is targeted policy. Processes that are targeted run in a confined domain. Other processes are run in unconfined domain. Processes runs on unconfined domain […]

(Featured image is a well know hex encoding of a code block that is used for buffer overflow attacks) SELinux Context: When SELinux is in enabled mode, all the files/processes are labeled with SELinux context. Context made of SELinux user/role/type and possibly a level. SELinux use these data, context, to make access control decisions. RHEL/CentOS […]